breakpointHQ / snoopView external linksLinks
Secretly record audio and video with chromium based browsers.
☆23Feb 14, 2024Updated last year
Alternatives and similar repositories for snoop
Users that are interested in snoop are comparing it to the libraries listed below
Sorting:
- Disable PPL via custom driver and dump lsass☆15Mar 13, 2021Updated 4 years ago
- A proof of concept for a clickjacking attack on macOS.☆97Feb 12, 2024Updated 2 years ago
- Mimikatz built as a static library.☆12Feb 9, 2022Updated 4 years ago
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Updated this week
- Man in the Browser Framework☆48Dec 24, 2024Updated last year
- PoC of macho loading from memory☆58Nov 18, 2024Updated last year
- Programmatically extract saved passwords from Chromium based browsers.☆124Feb 26, 2022Updated 3 years ago
- 从入门到放弃的产物,学习过程中用python实现的一个单点c2基本功能☆11Mar 11, 2020Updated 5 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆18Jul 2, 2021Updated 4 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- basic proxy as an azure function serverless app☆18Jan 12, 2023Updated 3 years ago
- Execute MachO binaries in memory using CGo☆79May 24, 2021Updated 4 years ago
- ☆20Nov 5, 2025Updated 3 months ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Jun 20, 2021Updated 4 years ago
- JXA script based on research by Jeff Johnson on leveraging TextEdit to remove quarantine attributes on files. Jeff's original research is…☆17Jan 31, 2021Updated 5 years ago
- Discover DYLD_INSERT_LIBRARIES hijacks on macOS☆45Sep 15, 2022Updated 3 years ago
- One-Click to Completely Take Over A macOS Device☆18Aug 25, 2022Updated 3 years ago
- Are you forwarding DNS traffic to another server for some reason, but want to make sure only queries for certain names are passed? Say no…☆20Oct 16, 2022Updated 3 years ago
- An improvement over the original Mimikatz wrapper.☆19Aug 11, 2021Updated 4 years ago
- ☆36Mar 11, 2019Updated 6 years ago
- PoCs and technical analysis of three vulnerabilities found on Cisco AnyConnect for Windows: CVE-2020-3433, CVE-2020-3434 and CVE-2020-343…☆43Sep 25, 2020Updated 5 years ago
- CVE-2020–9934 POC☆23Jul 28, 2020Updated 5 years ago
- ☆26Mar 10, 2022Updated 3 years ago
- YARI is an interactive debugger for YARA Language.☆90Sep 10, 2025Updated 5 months ago
- GitLab Attack TOolkit☆34Oct 8, 2025Updated 4 months ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- defender_database☆24Oct 31, 2023Updated 2 years ago
- ☆21Feb 27, 2021Updated 4 years ago
- My personal collection of webshells for educational purposes. Most are custom implementations/adaptations of stuff I found on the interne…☆21May 20, 2024Updated last year
- Syscall BOF to arbitrarily add/detract process token privilege rights.☆61Jul 10, 2024Updated last year
- CVE-2019-12384 漏洞测试环境☆21Nov 16, 2022Updated 3 years ago
- JavaScript for Automation (JXA) tool to do Active Directory enumeration.☆105Feb 19, 2022Updated 3 years ago
- ☆51Sep 18, 2020Updated 5 years ago
- A .NET implementation to dump SAM / SECURITY / SYSTEM registry hives☆56Sep 25, 2020Updated 5 years ago
- A map of the botnet attacking our server☆14Aug 24, 2017Updated 8 years ago
- ☆36May 27, 2024Updated last year
- Hades is a Host-Based Intrusion Detection System based on both eBPF(kernel) and netlink/cn_proc(userspace).☆28Dec 14, 2024Updated last year